District Acceptable Use Policy
The Cumberland Schools District offers computer network with access to internet and email services for all students in the area. This network and other related technological resources give students the opportunity to enhance their learning styles and achieve their educational goals. Users, who are mainly students, can observe events around the world and acquire all type of information through the system of the school. However, students are required to use this internet and the technological resources such as the computers within a strict framework the acceptable use policy.
The use of the internet and computers is strictly limited to activities that are meant to aid learning. The exception from this policy is only granted with the permission of the superintendent if he or she deems it is in the best interest of the school system. It is also incumbent on the superintendent to ensure the school system computers, as well as the internet connections, are in full compliance with the federal rules on filtering software, Internet monitoring and the safety policies from the technological resources.
Delegate your assignment to our experts and they will do the rest.
Another policy is that the software purchased and installed by the school cannot be copied for any other personal use. Students have to adhere to the copyrights rules and avoid using the technological gadgets for personal use without the permission of the tutor. The internet connection and the computers are not allowed to be used for downloading any entertainment video or photograph. Students are not supposed to access sites such as YouTube because the technological resources are only meant for learning.
The superintendent has the right of monitoring the use of the technological resources to ensure there is full compliance with the acceptable use policy. Parents must approve the use of the internet by their children through a signature presented to the school.
User-Friendly Computer Rules
The computers have to be shut down, and power switched off after use. No discs should ever be left in the players of the computers; they have to be ejected after use and before shutting it down. The computers should be put in a special room separated from the others. This computer room must be kept clean and free from dust throughout. Dust is very harmful to the operating system of the computer. All these rules are implemented through appointing students who should be in charge of it and enforce it among the students.
Safe computer use
I will be able to train the students on safe computer use by first of all listing some of the safe computer use practices such as avoiding obscene and unauthorized engagements on the computer. Moreover, I will train them how to shut down the computer as well as ejecting a disc from it. I will teach them the importance of keeping their account passwords secret and logging out from any account they have before shutting the computer down.
The computer laboratory assistants on standby at every desk monitor every student’s use to ensure everything is as required. They help the tutor to monitor the students. Security and privacy are ensured through the use of censored passwords. Unapproved site access is prevented through the disabling such sites on the school computers IP. The server is disabled hence students cannot access the sites using the school computers. The IP's of these computers are blocked. Cyber bullying can be controlling by allocating each student their desk in the computer laboratory. This will ensure that no one is bullied by another student over the lack of space to operate from during the practical computer exercise.